TY - GEN
T1 - Detecting host location attacks in SDN-based networks
AU - Baidya, Sonali Sen
AU - Hewett, Rattikorn
N1 - Publisher Copyright:
© 2020 IEEE.
Copyright:
Copyright 2020 Elsevier B.V., All rights reserved.
PY - 2020/5
Y1 - 2020/5
N2 - Software Defined Networking (SDN) is an emerging technology that has increasingly become popular for implementing modern infrastructures. SDN offers advantages of programmable and flexible network management over the traditional practice. As more and more SDN-based networks are being implemented, it is necessary to consider security issues especially those that are inherent from SDN. This paper addresses an important SDN specific security issue, namely a host location (tracking) attack, where an attacker compromises a host and captures its location information to manipulate the packets and trick the controller. Such an attack can potentially lead to many harmful effects including disruption of network traffic and denial of services. In particular, we introduce a new host location attack that exploits unused ports, along with its countermeasure for the controller to detect and take appropriate actions. We illustrate and evaluate the proposed detection mechanism by network simulations. The results obtained from our experiments are effective and promising.
AB - Software Defined Networking (SDN) is an emerging technology that has increasingly become popular for implementing modern infrastructures. SDN offers advantages of programmable and flexible network management over the traditional practice. As more and more SDN-based networks are being implemented, it is necessary to consider security issues especially those that are inherent from SDN. This paper addresses an important SDN specific security issue, namely a host location (tracking) attack, where an attacker compromises a host and captures its location information to manipulate the packets and trick the controller. Such an attack can potentially lead to many harmful effects including disruption of network traffic and denial of services. In particular, we introduce a new host location attack that exploits unused ports, along with its countermeasure for the controller to detect and take appropriate actions. We illustrate and evaluate the proposed detection mechanism by network simulations. The results obtained from our experiments are effective and promising.
KW - SDN security
KW - Software-Defined Networking
KW - host discovery
KW - host hijacking attacks
UR - http://www.scopus.com/inward/record.url?scp=85091897793&partnerID=8YFLogxK
U2 - 10.1109/WOCC48579.2020.9114932
DO - 10.1109/WOCC48579.2020.9114932
M3 - Conference contribution
AN - SCOPUS:85091897793
T3 - 2020 29th Wireless and Optical Communications Conference, WOCC 2020
BT - 2020 29th Wireless and Optical Communications Conference, WOCC 2020
PB - Institute of Electrical and Electronics Engineers Inc.
Y2 - 1 May 2020 through 2 May 2020
ER -